OLD | NEW |
(Empty) | |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. |
| 4 |
| 5 #include "components/crash/tools/crash_service.h" |
| 6 |
| 7 #include <windows.h> |
| 8 |
| 9 #include <sddl.h> |
| 10 #include <fstream> |
| 11 #include <map> |
| 12 |
| 13 #include "base/command_line.h" |
| 14 #include "base/files/file_util.h" |
| 15 #include "base/logging.h" |
| 16 #include "base/win/windows_version.h" |
| 17 #include "breakpad/src/client/windows/crash_generation/client_info.h" |
| 18 #include "breakpad/src/client/windows/crash_generation/crash_generation_server.h
" |
| 19 #include "breakpad/src/client/windows/sender/crash_report_sender.h" |
| 20 |
| 21 namespace breakpad { |
| 22 |
| 23 namespace { |
| 24 |
| 25 const wchar_t kTestPipeName[] = L"\\\\.\\pipe\\ChromeCrashServices"; |
| 26 |
| 27 const wchar_t kCrashReportURL[] = L"https://clients2.google.com/cr/report"; |
| 28 const wchar_t kCheckPointFile[] = L"crash_checkpoint.txt"; |
| 29 |
| 30 typedef std::map<std::wstring, std::wstring> CrashMap; |
| 31 |
| 32 bool CustomInfoToMap(const google_breakpad::ClientInfo* client_info, |
| 33 const std::wstring& reporter_tag, CrashMap* map) { |
| 34 google_breakpad::CustomClientInfo info = client_info->GetCustomInfo(); |
| 35 |
| 36 for (uintptr_t i = 0; i < info.count; ++i) { |
| 37 (*map)[info.entries[i].name] = info.entries[i].value; |
| 38 } |
| 39 |
| 40 (*map)[L"rept"] = reporter_tag; |
| 41 |
| 42 return !map->empty(); |
| 43 } |
| 44 |
| 45 bool WriteCustomInfoToFile(const std::wstring& dump_path, const CrashMap& map) { |
| 46 std::wstring file_path(dump_path); |
| 47 size_t last_dot = file_path.rfind(L'.'); |
| 48 if (last_dot == std::wstring::npos) |
| 49 return false; |
| 50 file_path.resize(last_dot); |
| 51 file_path += L".txt"; |
| 52 |
| 53 std::wofstream file(file_path.c_str(), |
| 54 std::ios_base::out | std::ios_base::app | std::ios::binary); |
| 55 if (!file.is_open()) |
| 56 return false; |
| 57 |
| 58 CrashMap::const_iterator pos; |
| 59 for (pos = map.begin(); pos != map.end(); ++pos) { |
| 60 std::wstring line = pos->first; |
| 61 line += L':'; |
| 62 line += pos->second; |
| 63 line += L'\n'; |
| 64 file.write(line.c_str(), static_cast<std::streamsize>(line.length())); |
| 65 } |
| 66 return true; |
| 67 } |
| 68 |
| 69 // The window procedure task is to handle when a) the user logs off. |
| 70 // b) the system shuts down or c) when the user closes the window. |
| 71 LRESULT __stdcall CrashSvcWndProc(HWND hwnd, UINT message, |
| 72 WPARAM wparam, LPARAM lparam) { |
| 73 switch (message) { |
| 74 case WM_CLOSE: |
| 75 case WM_ENDSESSION: |
| 76 case WM_DESTROY: |
| 77 PostQuitMessage(0); |
| 78 break; |
| 79 default: |
| 80 return DefWindowProc(hwnd, message, wparam, lparam); |
| 81 } |
| 82 return 0; |
| 83 } |
| 84 |
| 85 // This is the main and only application window. |
| 86 HWND g_top_window = NULL; |
| 87 |
| 88 bool CreateTopWindow(HINSTANCE instance, bool visible) { |
| 89 WNDCLASSEXW wcx = {0}; |
| 90 wcx.cbSize = sizeof(wcx); |
| 91 wcx.style = CS_HREDRAW | CS_VREDRAW; |
| 92 wcx.lpfnWndProc = CrashSvcWndProc; |
| 93 wcx.hInstance = instance; |
| 94 wcx.lpszClassName = L"crash_svc_class"; |
| 95 ::RegisterClassExW(&wcx); |
| 96 DWORD style = visible ? WS_POPUPWINDOW | WS_VISIBLE : WS_OVERLAPPED; |
| 97 |
| 98 // The window size is zero but being a popup window still shows in the |
| 99 // task bar and can be closed using the system menu or using task manager. |
| 100 HWND window = CreateWindowExW(0, wcx.lpszClassName, L"crash service", style, |
| 101 CW_USEDEFAULT, CW_USEDEFAULT, 0, 0, |
| 102 NULL, NULL, instance, NULL); |
| 103 if (!window) |
| 104 return false; |
| 105 |
| 106 ::UpdateWindow(window); |
| 107 VLOG(1) << "window handle is " << window; |
| 108 g_top_window = window; |
| 109 return true; |
| 110 } |
| 111 |
| 112 // Simple helper class to keep the process alive until the current request |
| 113 // finishes. |
| 114 class ProcessingLock { |
| 115 public: |
| 116 ProcessingLock() { |
| 117 ::InterlockedIncrement(&op_count_); |
| 118 } |
| 119 ~ProcessingLock() { |
| 120 ::InterlockedDecrement(&op_count_); |
| 121 } |
| 122 static bool IsWorking() { |
| 123 return (op_count_ != 0); |
| 124 } |
| 125 private: |
| 126 static volatile LONG op_count_; |
| 127 }; |
| 128 |
| 129 volatile LONG ProcessingLock::op_count_ = 0; |
| 130 |
| 131 // This structure contains the information that the worker thread needs to |
| 132 // send a crash dump to the server. |
| 133 struct DumpJobInfo { |
| 134 DWORD pid; |
| 135 CrashService* self; |
| 136 CrashMap map; |
| 137 std::wstring dump_path; |
| 138 |
| 139 DumpJobInfo(DWORD process_id, CrashService* service, |
| 140 const CrashMap& crash_map, const std::wstring& path) |
| 141 : pid(process_id), self(service), map(crash_map), dump_path(path) { |
| 142 } |
| 143 }; |
| 144 |
| 145 } // namespace |
| 146 |
| 147 // Command line switches: |
| 148 const char CrashService::kMaxReports[] = "max-reports"; |
| 149 const char CrashService::kNoWindow[] = "no-window"; |
| 150 const char CrashService::kReporterTag[] = "reporter"; |
| 151 const char CrashService::kDumpsDir[] = "dumps-dir"; |
| 152 const char CrashService::kPipeName[] = "pipe-name"; |
| 153 |
| 154 CrashService::CrashService() |
| 155 : dumper_(NULL), |
| 156 sender_(NULL), |
| 157 requests_handled_(0), |
| 158 requests_sent_(0), |
| 159 clients_connected_(0), |
| 160 clients_terminated_(0) { |
| 161 } |
| 162 |
| 163 CrashService::~CrashService() { |
| 164 base::AutoLock lock(sending_); |
| 165 delete dumper_; |
| 166 delete sender_; |
| 167 } |
| 168 |
| 169 bool CrashService::Initialize(const base::FilePath& operating_dir, |
| 170 const base::FilePath& dumps_path) { |
| 171 using google_breakpad::CrashReportSender; |
| 172 using google_breakpad::CrashGenerationServer; |
| 173 |
| 174 std::wstring pipe_name = kTestPipeName; |
| 175 int max_reports = -1; |
| 176 |
| 177 // The checkpoint file allows CrashReportSender to enforce the the maximum |
| 178 // reports per day quota. Does not seem to serve any other purpose. |
| 179 base::FilePath checkpoint_path = operating_dir.Append(kCheckPointFile); |
| 180 |
| 181 base::CommandLine& cmd_line = *base::CommandLine::ForCurrentProcess(); |
| 182 |
| 183 base::FilePath dumps_path_to_use = dumps_path; |
| 184 |
| 185 if (cmd_line.HasSwitch(kDumpsDir)) { |
| 186 dumps_path_to_use = |
| 187 base::FilePath(cmd_line.GetSwitchValueNative(kDumpsDir)); |
| 188 } |
| 189 |
| 190 // We can override the send reports quota with a command line switch. |
| 191 if (cmd_line.HasSwitch(kMaxReports)) |
| 192 max_reports = _wtoi(cmd_line.GetSwitchValueNative(kMaxReports).c_str()); |
| 193 |
| 194 // Allow the global pipe name to be overridden for better testability. |
| 195 if (cmd_line.HasSwitch(kPipeName)) |
| 196 pipe_name = cmd_line.GetSwitchValueNative(kPipeName); |
| 197 |
| 198 #ifdef _WIN64 |
| 199 pipe_name += L"-x64"; |
| 200 #endif |
| 201 |
| 202 if (max_reports > 0) { |
| 203 // Create the http sender object. |
| 204 sender_ = new CrashReportSender(checkpoint_path.value()); |
| 205 sender_->set_max_reports_per_day(max_reports); |
| 206 } |
| 207 |
| 208 SECURITY_ATTRIBUTES security_attributes = {0}; |
| 209 SECURITY_ATTRIBUTES* security_attributes_actual = NULL; |
| 210 |
| 211 if (base::win::GetVersion() >= base::win::VERSION_VISTA) { |
| 212 SECURITY_DESCRIPTOR* security_descriptor = |
| 213 reinterpret_cast<SECURITY_DESCRIPTOR*>( |
| 214 GetSecurityDescriptorForLowIntegrity()); |
| 215 DCHECK(security_descriptor != NULL); |
| 216 |
| 217 security_attributes.nLength = sizeof(security_attributes); |
| 218 security_attributes.lpSecurityDescriptor = security_descriptor; |
| 219 security_attributes.bInheritHandle = FALSE; |
| 220 |
| 221 security_attributes_actual = &security_attributes; |
| 222 } |
| 223 |
| 224 // Create the OOP crash generator object. |
| 225 dumper_ = new CrashGenerationServer(pipe_name, security_attributes_actual, |
| 226 &CrashService::OnClientConnected, this, |
| 227 &CrashService::OnClientDumpRequest, this, |
| 228 &CrashService::OnClientExited, this, |
| 229 NULL, NULL, |
| 230 true, &dumps_path_to_use.value()); |
| 231 |
| 232 if (!dumper_) { |
| 233 LOG(ERROR) << "could not create dumper"; |
| 234 if (security_attributes.lpSecurityDescriptor) |
| 235 LocalFree(security_attributes.lpSecurityDescriptor); |
| 236 return false; |
| 237 } |
| 238 |
| 239 if (!CreateTopWindow(::GetModuleHandleW(NULL), |
| 240 !cmd_line.HasSwitch(kNoWindow))) { |
| 241 LOG(ERROR) << "could not create window"; |
| 242 if (security_attributes.lpSecurityDescriptor) |
| 243 LocalFree(security_attributes.lpSecurityDescriptor); |
| 244 return false; |
| 245 } |
| 246 |
| 247 reporter_tag_ = L"crash svc"; |
| 248 if (cmd_line.HasSwitch(kReporterTag)) |
| 249 reporter_tag_ = cmd_line.GetSwitchValueNative(kReporterTag); |
| 250 |
| 251 // Log basic information. |
| 252 VLOG(1) << "pipe name is " << pipe_name |
| 253 << "\ndumps at " << dumps_path_to_use.value(); |
| 254 |
| 255 if (sender_) { |
| 256 VLOG(1) << "checkpoint is " << checkpoint_path.value() |
| 257 << "\nserver is " << kCrashReportURL |
| 258 << "\nmaximum " << sender_->max_reports_per_day() << " reports/day" |
| 259 << "\nreporter is " << reporter_tag_; |
| 260 } |
| 261 // Start servicing clients. |
| 262 if (!dumper_->Start()) { |
| 263 LOG(ERROR) << "could not start dumper"; |
| 264 if (security_attributes.lpSecurityDescriptor) |
| 265 LocalFree(security_attributes.lpSecurityDescriptor); |
| 266 return false; |
| 267 } |
| 268 |
| 269 if (security_attributes.lpSecurityDescriptor) |
| 270 LocalFree(security_attributes.lpSecurityDescriptor); |
| 271 |
| 272 // This is throwaway code. We don't need to sync with the browser process |
| 273 // once Google Update is updated to a version supporting OOP crash handling. |
| 274 // Create or open an event to signal the browser process that the crash |
| 275 // service is initialized. |
| 276 HANDLE running_event = |
| 277 ::CreateEventW(NULL, TRUE, TRUE, L"g_chrome_crash_svc"); |
| 278 // If the browser already had the event open, the CreateEvent call did not |
| 279 // signal it. We need to do it manually. |
| 280 ::SetEvent(running_event); |
| 281 |
| 282 return true; |
| 283 } |
| 284 |
| 285 void CrashService::OnClientConnected(void* context, |
| 286 const google_breakpad::ClientInfo* client_info) { |
| 287 ProcessingLock lock; |
| 288 VLOG(1) << "client start. pid = " << client_info->pid(); |
| 289 CrashService* self = static_cast<CrashService*>(context); |
| 290 ::InterlockedIncrement(&self->clients_connected_); |
| 291 } |
| 292 |
| 293 void CrashService::OnClientExited(void* context, |
| 294 const google_breakpad::ClientInfo* client_info) { |
| 295 ProcessingLock lock; |
| 296 VLOG(1) << "client end. pid = " << client_info->pid(); |
| 297 CrashService* self = static_cast<CrashService*>(context); |
| 298 ::InterlockedIncrement(&self->clients_terminated_); |
| 299 |
| 300 if (!self->sender_) |
| 301 return; |
| 302 |
| 303 // When we are instructed to send reports we need to exit if there are |
| 304 // no more clients to service. The next client that runs will start us. |
| 305 // Only chrome.exe starts crash_service with a non-zero max_reports. |
| 306 if (self->clients_connected_ > self->clients_terminated_) |
| 307 return; |
| 308 if (self->sender_->max_reports_per_day() > 0) { |
| 309 // Wait for the other thread to send crashes, if applicable. The sender |
| 310 // thread takes the sending_ lock, so the sleep is just to give it a |
| 311 // chance to start. |
| 312 ::Sleep(1000); |
| 313 base::AutoLock lock(self->sending_); |
| 314 // Some people can restart chrome very fast, check again if we have |
| 315 // a new client before exiting for real. |
| 316 if (self->clients_connected_ == self->clients_terminated_) { |
| 317 VLOG(1) << "zero clients. exiting"; |
| 318 ::PostMessage(g_top_window, WM_CLOSE, 0, 0); |
| 319 } |
| 320 } |
| 321 } |
| 322 |
| 323 void CrashService::OnClientDumpRequest(void* context, |
| 324 const google_breakpad::ClientInfo* client_info, |
| 325 const std::wstring* file_path) { |
| 326 ProcessingLock lock; |
| 327 |
| 328 if (!file_path) { |
| 329 LOG(ERROR) << "dump with no file path"; |
| 330 return; |
| 331 } |
| 332 if (!client_info) { |
| 333 LOG(ERROR) << "dump with no client info"; |
| 334 return; |
| 335 } |
| 336 |
| 337 CrashService* self = static_cast<CrashService*>(context); |
| 338 if (!self) { |
| 339 LOG(ERROR) << "dump with no context"; |
| 340 return; |
| 341 } |
| 342 |
| 343 CrashMap map; |
| 344 CustomInfoToMap(client_info, self->reporter_tag_, &map); |
| 345 |
| 346 // Move dump file to the directory under client breakpad dump location. |
| 347 base::FilePath dump_location = base::FilePath(*file_path); |
| 348 CrashMap::const_iterator it = map.find(L"breakpad-dump-location"); |
| 349 if (it != map.end()) { |
| 350 base::FilePath alternate_dump_location = base::FilePath(it->second); |
| 351 base::CreateDirectoryW(alternate_dump_location); |
| 352 alternate_dump_location = alternate_dump_location.Append( |
| 353 dump_location.BaseName()); |
| 354 base::Move(dump_location, alternate_dump_location); |
| 355 dump_location = alternate_dump_location; |
| 356 } |
| 357 |
| 358 DWORD pid = client_info->pid(); |
| 359 VLOG(1) << "dump for pid = " << pid << " is " << dump_location.value(); |
| 360 |
| 361 if (!WriteCustomInfoToFile(dump_location.value(), map)) { |
| 362 LOG(ERROR) << "could not write custom info file"; |
| 363 } |
| 364 |
| 365 if (!self->sender_) |
| 366 return; |
| 367 |
| 368 // Send the crash dump using a worker thread. This operation has retry |
| 369 // logic in case there is no internet connection at the time. |
| 370 DumpJobInfo* dump_job = new DumpJobInfo(pid, self, map, |
| 371 dump_location.value()); |
| 372 if (!::QueueUserWorkItem(&CrashService::AsyncSendDump, |
| 373 dump_job, WT_EXECUTELONGFUNCTION)) { |
| 374 LOG(ERROR) << "could not queue job"; |
| 375 } |
| 376 } |
| 377 |
| 378 // We are going to try sending the report several times. If we can't send, |
| 379 // we sleep from one minute to several hours depending on the retry round. |
| 380 unsigned long CrashService::AsyncSendDump(void* context) { |
| 381 if (!context) |
| 382 return 0; |
| 383 |
| 384 DumpJobInfo* info = static_cast<DumpJobInfo*>(context); |
| 385 |
| 386 std::wstring report_id = L"<unsent>"; |
| 387 |
| 388 const DWORD kOneMinute = 60*1000; |
| 389 const DWORD kOneHour = 60*kOneMinute; |
| 390 |
| 391 const DWORD kSleepSchedule[] = { |
| 392 24*kOneHour, |
| 393 8*kOneHour, |
| 394 4*kOneHour, |
| 395 kOneHour, |
| 396 15*kOneMinute, |
| 397 0}; |
| 398 |
| 399 int retry_round = arraysize(kSleepSchedule) - 1; |
| 400 |
| 401 do { |
| 402 ::Sleep(kSleepSchedule[retry_round]); |
| 403 { |
| 404 // Take the server lock while sending. This also prevent early |
| 405 // termination of the service object. |
| 406 base::AutoLock lock(info->self->sending_); |
| 407 VLOG(1) << "trying to send report for pid = " << info->pid; |
| 408 google_breakpad::ReportResult send_result |
| 409 = info->self->sender_->SendCrashReport(kCrashReportURL, info->map, |
| 410 info->dump_path, &report_id); |
| 411 switch (send_result) { |
| 412 case google_breakpad::RESULT_FAILED: |
| 413 report_id = L"<network issue>"; |
| 414 break; |
| 415 case google_breakpad::RESULT_REJECTED: |
| 416 report_id = L"<rejected>"; |
| 417 ++info->self->requests_handled_; |
| 418 retry_round = 0; |
| 419 break; |
| 420 case google_breakpad::RESULT_SUCCEEDED: |
| 421 ++info->self->requests_sent_; |
| 422 ++info->self->requests_handled_; |
| 423 retry_round = 0; |
| 424 break; |
| 425 case google_breakpad::RESULT_THROTTLED: |
| 426 report_id = L"<throttled>"; |
| 427 break; |
| 428 default: |
| 429 report_id = L"<unknown>"; |
| 430 break; |
| 431 }; |
| 432 } |
| 433 |
| 434 VLOG(1) << "dump for pid =" << info->pid << " crash2 id =" << report_id; |
| 435 --retry_round; |
| 436 } while (retry_round >= 0); |
| 437 |
| 438 if (!::DeleteFileW(info->dump_path.c_str())) |
| 439 LOG(WARNING) << "could not delete " << info->dump_path; |
| 440 |
| 441 delete info; |
| 442 return 0; |
| 443 } |
| 444 |
| 445 int CrashService::ProcessingLoop() { |
| 446 MSG msg; |
| 447 while (GetMessage(&msg, NULL, 0, 0)) { |
| 448 TranslateMessage(&msg); |
| 449 DispatchMessage(&msg); |
| 450 } |
| 451 |
| 452 VLOG(1) << "session ending.."; |
| 453 while (ProcessingLock::IsWorking()) { |
| 454 ::Sleep(50); |
| 455 } |
| 456 |
| 457 VLOG(1) << "clients connected :" << clients_connected_ |
| 458 << "\nclients terminated :" << clients_terminated_ |
| 459 << "\ndumps serviced :" << requests_handled_ |
| 460 << "\ndumps reported :" << requests_sent_; |
| 461 |
| 462 return static_cast<int>(msg.wParam); |
| 463 } |
| 464 |
| 465 PSECURITY_DESCRIPTOR CrashService::GetSecurityDescriptorForLowIntegrity() { |
| 466 // Build the SDDL string for the label. |
| 467 std::wstring sddl = L"S:(ML;;NW;;;S-1-16-4096)"; |
| 468 |
| 469 PSECURITY_DESCRIPTOR sec_desc = NULL; |
| 470 |
| 471 PACL sacl = NULL; |
| 472 BOOL sacl_present = FALSE; |
| 473 BOOL sacl_defaulted = FALSE; |
| 474 |
| 475 if (::ConvertStringSecurityDescriptorToSecurityDescriptorW(sddl.c_str(), |
| 476 SDDL_REVISION, |
| 477 &sec_desc, NULL)) { |
| 478 if (::GetSecurityDescriptorSacl(sec_desc, &sacl_present, &sacl, |
| 479 &sacl_defaulted)) { |
| 480 return sec_desc; |
| 481 } |
| 482 } |
| 483 |
| 484 return NULL; |
| 485 } |
| 486 |
| 487 } // namespace breakpad |
OLD | NEW |